Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

JPMorgan Red Team Operator Assessments & Exercises Vice President 
United States, Ohio, Columbus 
243009403

26.06.2024

Contribute to leading-edge security and resilience efforts, advancing protective strategies and propelling continuous improvement.

with a

Job responsibilities

  • Perform and manage hands-on offensive security activities leveraging social engineering skillsets as part of Red Team engagements against critical JPMC assets
  • Conduct business process assessments to include tabletop or workshop sessions, live testing of business process controls by technical and social engineering attacks, and preparation of deliverables for senior stakeholders
  • Produce reports about cybersecurity and fraud vulnerabilities, threats, designs, and procedures and articulate and visually present complex technical and fraud subject matter to a wide and senior audience
  • Design and execute testing and simulations – such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm’s strategy and compliance with regulatory requirements
  • Evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation
  • Collaborate closely with cross-functional teams to develop comprehensive assessment reports – including detailed findings, risk assessments, and remediation recommendations – making data-driven decisions that utilize continuous improvement
  • Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy and risk management. Engage with peers and industry groups that share threat intelligence analytics

Required qualifications, capabilities, and skills

  • 5+ years of experience in cybersecurity or resiliency, with demonstrated exceptional organizational skills to plan, design, and coordinate the development of offensive security testing, assessments, or simulation exercises
  • High level of proficiency in performing targeted, covert security tests with vulnerability identification, exploitation, and post-exploitation activities
  • Strong understanding of the following: networking fundamentals (all OSI layers, protocols); Windows/ Linux/Unix/Mac operating systems as well as software vulnerability and exploitation techniques; commercial or open-source offensive security tools for reconnaissance, scanning, exploitation and post-exploitation (e.g. Cobalt Strike, Metasploit, Nmap, Nessus, Burp Suite)
  • Familiarity with system administration skills such as configuration, maintenance, and interpretation of log output from networking devices, operating systems, and infrastructure services, as well as with cloud architecture, operations, and security vulnerabilities
  • Experience in multiple businesses or verticals, with organizational and cultural understanding of call centers, payments processes, and client service/sales organizations
  • Expertise in collaborating with high-performing teams and individuals throughout the firm to accomplish common goals
  • Knowledge of US financial services sector cybersecurity or resiliency organization practices, operations risk management processes, principles, regulations, threats, risks, and incident response methodologies
  • Ability to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation, and proficiency in multiple security assessment methodologies (e.g., Open Worldwide Application Security Project (OWASP) Top Ten, National Institute of Standards and Technology (NIST) Cybersecurity Framework), offensive testing tools, or resiliency testing equivalents
  • Excellent communication, collaboration, and report writing skills, with the ability to influence and engage stakeholders across various functions and levels

Preferred qualifications, capabilities, and skills

  • Social engineering background (or intelligence, vice, or similar experience)
  • Experience in operationalizing AI/ML/LLMs to develop synthetic voice or face models for security testing
  • Knowledge of fraud controls
  • Skills that include obfuscating email and telephone systems
  • Technical knowledge such as: developing in-house scripting; using interpreted languages (such as Ruby, Python, or Perl) and compiled languages (such as C, C++, C#, or Java); understanding security tools or technology such as firewalls, IDS/IPS, web proxies, and DLP
  • Information Security experience in two or more of the following verticals: fraud operations, threat modeling, network/application security testing, social engineering, Red Team operations, and network exploitation operations
  • Ability to support and grow skillsets for Cybersecurity Red Team operations